LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
IT security takes back seat to compliance
07 November 2005
Complying with regulatory requirements is now the key driver for firms implementing information secu
General Security
1 - 2 min read
Offshoring pushes BS7799 security
07 November 2005
When organisations allow outsourcers or other third parties - whether local or offshore - to handle
General Security
1 - 2 min read
Replacing FTP and Telnet in Cross-platform Networks
07 November 2005
Telnet, Rsh, Rlogin, Rcp, and FTP are commonly used methods to access files and execute commands on
Network Security
1 - 2 min read
IT Security Concerns Spreading
04 November 2005
The Trusted Network Initiative is not just about who the user is, but their devices too -- and how w
General Security
1 - 2 min read
Wi-Fi is not 'enterprise-secure', says AT&T
03 November 2005
Wi-Fi networks are not secure enough for enterprises to run their businesses, according to a senior
Wireless Security
1 - 2 min read
Is VoIP Ripe for Attack?
02 November 2005
"As soon as the enterprise opens up VoIP to the Internet, they put a potentially huge security hole
Wireless Security
1 - 2 min read
Data Security: It's Not Just for Secret Agents Anymore
01 November 2005
The secret agent quietly enters the generic-looking office complex. The agent's assault team has the
General Security
1 - 2 min read
SECURITY: True or false?
31 October 2005
A survey conducted by the National Cyber Security Alliance (NCSA) and the US Department of Homeland
General Security
1 - 2 min read
Linux Developer Ready for Scrutiny
31 October 2005
The Common Criteria evaluation covers three protection profiles related to controlling access to inf
General Security
1 - 2 min read
Two Factor Authentication Systems?
27 October 2005
I've been given a project to undertake that involves setting our internal network systems up to have
Host Security
1 - 2 min read
Hotrod Your Linksys WAP with Linux
26 October 2005
A lot of Linux geeks are master scroungers, because Linux is so adaptable that old AMDs, classic Pen
Network Security
1 - 2 min read
VOIP may be vulnerable to barrage of threats
25 October 2005
Is enterprise VoIP (voice over IP) due for a security wakeup call or are the threats mostly exaggera
Network Security